A survey on top security threats in cloud computing

Abstract

Cloud computing enables the sharing of resources such as storage, network, applications and software through internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they use. However, despite all cloud benefits there are many security concerns related to hardware, virtualization, network, data and service providers that act as a significant barrier in the adoption of cloud in the IT industry. In this paper, we survey the top security concerns related to cloud computing. For each of these security threats we describe, i) how it can be used to exploit cloud components and its effect on cloud entities such as providers and users, and ii) the security solutions that must be taken to prevent these threats. These solutions include the security techniques from existing literature as well as the best security practices that must be followed by cloud administrators.

Authors and Affiliations

Muhammad Kazim, Shao Zhu

Keywords

Related Articles

Building an Artificial Idiotopic Immune Model Based on Artificial Neural Network Ideology

In the literature, there were many research efforts that utilized the artificial immune networks to model their designed applications, but they were considerably complicated, and restricted to a few areas that such as co...

A Survey on Content-based Image Retrieval

The widespread of smart devices along with the exponential growth of virtual societies yield big digital image databases. These databases can be counter-productive if they are not coupled with efficient Content-Based Ima...

Robust Fuzzy-Second Order Sliding Mode based Direct Power Control for Voltage Source Converter

This paper focuses on a second order sliding mode based direct power controller (SOSM-DPC) of a three-phase grid-connected voltage source converter (VSC). The proposed control scheme combined with fuzzy logic aims at reg...

Embedded Feature Selection Method for a Network-Level Behavioural Analysis Detection Model

Feature selection in network-level behavioural analysis studies is used to represent the network datasets of a monitored space. However, recent studies have shown that current behavioural analysis methods at the network-...

E-Learning for Secondary and Higher Education Sectors: A Survey

Electronic learning (e-learning) has gained reasonable acceptance from educational institutions at all levels. There are various studies conducted by researchers considering different aspects of e-learning to investigate...

Download PDF file
  • EP ID EP142748
  • DOI 10.14569/IJACSA.2015.060316
  • Views 101
  • Downloads 0

How To Cite

Muhammad Kazim, Shao Zhu (2015). A survey on top security threats in cloud computing. International Journal of Advanced Computer Science & Applications, 6(3), 109-113. https://europub.co.uk/articles/-A-142748